It appears that cybercriminals are back in the game, with yet another Verizon Wireless themed malicious campaign, enticing users to click on the malicious link found in the email. Once users click on the link, they’re automatically exposed to the client-side exploits served by the latest version of the Black Hole Exploit Kit.

Responding to 59.57.247.185 are also the following malicious campaigns part of the campaign’s infrastructure:sessionid0147239047829578349578239077.pllatticesoft.netafricanbeat.neteaglepointecondo.bizeaglepointecondo.infoeaglepointecondo.orghfeitu.netlabpr.comwinterskyserf.ru

Although the cybercriminals didn’t bother coming up with a visually appealing email template impersonating Verizon Wireless like we’ve seen in the previously profiled Verizon Wireless themed campaigns from 2012, they continued to rely on the same malicious infrastructure used in the previously profiled Citi themed malicious campaign, indicating poor QA (Quality Assurance) on their behalf.

We’ll continue monitoring the campaign, and post updates as soon as new development emerge.